000 04363nam a22005775i 4500
001 978-3-642-12678-9
003 DE-He213
005 20140220084535.0
007 cr nn 008mamaa
008 100429s2010 gw | s |||| 0|eng d
020 _a9783642126789
_9978-3-642-12678-9
024 7 _a10.1007/978-3-642-12678-9
_2doi
050 4 _aQA76.9.A25
072 7 _aURY
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.82
_223
100 1 _aBernstein, Daniel J.
_eeditor.
245 1 0 _aProgress in Cryptology – AFRICACRYPT 2010
_h[electronic resource] :
_bThird International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings /
_cedited by Daniel J. Bernstein, Tanja Lange.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2010.
300 _aXIII, 437p. 43 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v6055
505 0 _aSignatures -- A New RSA-Based Signature Scheme -- Fair Blind Signatures without Random Oracles -- Fair Partially Blind Signatures -- Attacks -- Parallel Shortest Lattice Vector Enumeration on Graphics Cards -- Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over -- Factoring RSA Modulus Using Prime Reconstruction from Random Known Bits -- Protocols -- Proofs of Restricted Shuffles -- Batch Range Proof for Practical Small Ranges -- Optimistic Fair Priced Oblivious Transfer -- Networks -- Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes -- Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes -- Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience -- Elliptic Curves -- Avoiding Full Extension Field Arithmetic in Pairing Computations -- ECC2K-130 on Cell CPUs -- Side-Channel Attacks and Fault Attacks -- Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator -- Differential Fault Analysis of HC-128 -- Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices -- Public-Key Encryption -- Strong Cryptography from Weak Secrets -- Efficient Unidirectional Proxy Re-Encryption -- Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions -- Keys and PUFs -- Flexible Group Key Exchange with On-demand Computation of Subgroup Keys -- Quantum Readout of Physical Unclonable Functions -- Ciphers and Hash Functions -- Parallelizing the Camellia and SMS4 Block Ciphers -- Improved Linear Differential Attacks on CubeHash -- Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512.
520 _aThis book constitutes the proceedings of the Third International Conference on Cryptology in Africa, AFRICACRYPT 2010, held in Stellenbosch, South Africa, on May 3-6, 2010. The 25 papers presented together with three invited talks were carefully reviewed and selected from 82 submissions. The topics covered are signatures, attacks, protocols, networks, elliptic curves, side-channel attacks and fault attacks, public-key encryption, keys and PUFs, and ciphers and hash functions.
650 0 _aComputer science.
650 0 _aComputer Communication Networks.
650 0 _aOperating systems (Computers).
650 0 _aData protection.
650 0 _aData encryption (Computer science).
650 0 _aComputer software.
650 0 _aInformation Systems.
650 1 4 _aComputer Science.
650 2 4 _aData Encryption.
650 2 4 _aComputer Communication Networks.
650 2 4 _aManagement of Computing and Information Systems.
650 2 4 _aAlgorithm Analysis and Problem Complexity.
650 2 4 _aSystems and Data Security.
650 2 4 _aOperating Systems.
700 1 _aLange, Tanja.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783642126772
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v6055
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-642-12678-9
912 _aZDB-2-SCS
912 _aZDB-2-LNC
999 _c112123
_d112123